Weiqing Sun

Orcid: 0000-0002-6973-0509

According to our database1, Weiqing Sun authored at least 51 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Generation of Face Privacy-Protected Images Based on the Diffusion Model.
Entropy, June, 2024

2023
An improved PBFT consensus mechanism with trust value evaluation application in the agricultural product trusted traceability system.
J. High Speed Networks, 2023

Exploring False Demand Attacks in Power Grids with High PV Penetration.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
A Comparative Study on the Impact of Adversarial Machine Learning Attacks on Contemporary Intrusion Detection Datasets.
SN Comput. Sci., 2022

An Improved H-Algorand Consensus Mechanism With Credibility Assessment Applying in EMR Storage System.
IEEE Access, 2022

A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

SpamFender: A Semi-supervised Incremental Spam Classification System across Social Networks.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

An Approach to Improve the Robustness of Machine Learning based Intrusion Detection System Models Against the Carlini-Wagner Attack.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Soft Fault Diagnosis of Analog Circuits Based on a ResNet With Circuit Spectrum Map.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

Dynamic State Estimation for Power System Based on the Measurement Data Reconstructed by RGAN.
IEEE Access, 2021

Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Joint Planning and Operation for Renewable- Storage Under Different Financial Incentives and Market Mechanisms.
IEEE Access, 2020

Coordinated Planning With Predetermined Renewable Energy Generation Targets Using Extended Two-Stage Robust Optimization.
IEEE Access, 2020

A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Early Detection of Host-based Intrusions in Linux Environment.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

2019
Security Modeling of Autonomous Systems: A Survey.
ACM Comput. Surv., 2019

Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

2018
Security Enhancement of Over-the-Air Update for Connected Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

A Web-Based Lightweight Testbed for Supporting Network Security Hands-on Labs.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

2017
Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation.
Simul., 2017

A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN).
EAI Endorsed Trans. Security Safety, 2017

Normal and anomalous traffic flow pattern analysis for organizational networks.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2016
A Deep Learning Approach for Network Intrusion Detection System.
EAI Endorsed Trans. Security Safety, 2016

Distributed network traffic feature extraction for a real-time IDS.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

2015
Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation.
EAI Endorsed Trans. Scalable Inf. Syst., 2015

GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation.
EAI Endorsed Trans. Mob. Commun. Appl., 2015

Impact on SDN Powered Network Services Under Adversarial Attacks.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

Light VN: A Light-Weight Testbed for Network and Security Experiments.
Proceedings of the 12th International Conference on Information Technology, 2015

Security enhancement of secure USB debugging in Android system.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
A Smart Home Network Simulation Testbed for Cybersecurity Experimentation.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

2013
Trust System Design Optimization in Smart Grid Network Infrastructure.
IEEE Trans. Smart Grid, 2013

UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
A Real-Time Testbed for Routing Network.
Proceedings of the Testbeds and Research Infrastructure. Development of Networks and Communities, 2012

FPGA based device specific key generation method using Physically Uncloanble Functions and neural networks.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012

FPGA based trustworthy authentication technique using Physically Unclonable Functions and artificial intelligence.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

FPGA based key generation technique for anti-counterfeiting methods using Physically Unclonable Functions and artificial intelligence.
Proceedings of the 22nd International Conference on Field Programmable Logic and Applications (FPL), 2012

A neural network based distributed intrusion detection system on cloud platform.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Efficient trust node aware routing in ZigBee communication network of smart grid.
Proceedings of the IEEE Asian Solid State Circuits Conference, 2012

A Healthcare Information System with Augmented Access Controls.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids.
IEEE Trans. Smart Grid, 2011

I-RBAC: Isolation enabled role-based access control.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
Experiences from a Time-Condensed Computer Security Class.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2009
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software.
ACM Trans. Inf. Syst. Secur., 2009

Research on Transaction-Item Association Matrix Mining Algorithm in Large-scale Transaction Database.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments.
Proceedings of the Workshop on Cyber Security and Test, 2008

Practical Proactive Integrity Preservation: A Basis for Malware Defense.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Expanding Malware Defense by Securing Software Installations.
Proceedings of the Detection of Intrusions and Malware, 2008

2005
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
Proceedings of the Network and Distributed System Security Symposium, 2005


  Loading...